Build gen AI apps with an all-in-one modern database: MongoDB Atlas
MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
Start Free
Our Free Plans just got better! | Auth0
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
JRijndael is a 100% pure Java implementation of the popular Rijndael (aka AES) cryptography algorithm. It's designed to be implemented as easily as possible and features ECB, padding, and a simple API.
JSerpent is an easy to use Java implementation of the powerful Serpent cryptography algorithm. It can be easily implemented into any project, and is complete with ECB, padding, and a simple API.
Private-key, symmetrical (same password to encrypt and decode) file encryption with 8-bit to 2147483647-bit (2^3 to 2^31) encryption using my own algorithm and my own extension of MD5 (http://blog.robtoth.net/2009/06/tencryption-computer-programming.html
The Drools.NET is a .NET port for Drools, which is a java Rules Engine based on Charles Forgy's Rete algorithm. Drools.NET enables .NET developers/Users to exploit the powerful Rule Engine like Drools through a completely managed .NET code base.
Simply solve complex auth. Easy for devs to set up. Easy for non-devs to use.
Transform user access with Frontegg CIAM: login box, SSO, MFA, multi-tenancy, and 99.99% uptime.
Custom auth drains 25% of dev time and risks 62% more breaches, stalling enterprise deals. Frontegg platform delivers a simple login box, seamless authentication (SSO, MFA, passwordless), robust multi-tenancy, and a customizable Admin Portal. Integrate fast with the React SDK, meet compliance needs, and focus on innovation.
Molevolve is a Java library for running a Genetic Algorithm to model the 3-dimensional structures of peptide chains from amino-acid sequences. Client code can specify its own peptide chain model, fitness functions and GA operations. Requires JDK 1.5.
distDES is a Java RMI-based application which manages load balancing on heterogeneous clusters. Development will extend the theoretical initial implementation to include clustered Rainbow Table generation and encryptionalgorithm collision detection.
CryptoHelper is a Java program designed to aid in the decryption of classical ciphers, ie pre WWII ciphers. It brings together tools like frequency analysis, friedman tests, enciphering/deciphering for several clasical ciphers, and brute force algorithm
Javafon is an open source peer-to-peer audio-communication application written in Java. The audio signal is compressed with JSpeex. Furthermore it supports encryption through AES and Blowfish.
Advanced built-in security helps IT prevent breaches before they happen
Defend against security incidents with Chrome Enterprise. Create customizable controls, manage extensions and set proactive alerts to keep your data and employees protected without slowing down productivity.
Java Randomness Test Suite is a gui application to run randomness tests on random stream resource (file or algorithm). Application can be run in command line. Includes general statistical tests, NIST and DIEHARD tests.
mircCrypt is an encryption-script which enables you to communicate secured on irc-networks. By using a premade blowfish-algorithm-dll, it secures your chats by using free choosable keys. This script is just the link between the blowfish-dll and mirc.
Butterfly XML Editor is an IDE built on top of a new real-time incremental XML parsing algorithm. The editor features syntax and error highlighting, incremental validation, code completion, XSLT pipelines, and side by side DOM and source viewing.
This project provides an interface to Sun's JCE (Java Cryptographic Extensions) as a JSP taglib. It brings strong encryption algorithms such as AES and Blowfish to your JSP applications. It uses the bouncycastle.org cleanroom JCE 1.2.1 implementation as
BIM is a Java based AOL Instant Messenger (AIM) Client featuring a full feature Swing GUI. BIM also comes with encryption support. It has a small code base (617KB w/encryption libs) and can be easily dropped and run on wide array of operating systems.
ObscureEncrypt is a high level security encrypter. It encrypts at three levels, 448 bit Blowfishencryption, Obscurity, high level encryption. Making it almost impossible to decrypt
bcrypt is a lightweight blowfish file encryption utility which aims for cross-platform portability of not only the actual code, but the encrypted files as well. In addition to providing 448-bit encryption, bcrypt overwrites input files with random garbage
a java chat system, that encrypts all transfered data to protect the users privacy. Encryption will be done by rsa, blowfish, 3ds or an easy 'exclusive or' encryption. the client will hava a complete gui, the server in addition a console frontend.
Passkeyper is an encrypted password keeper program for the Sharp Zaurus and runs in the PersonalJava environment. It uses the legendary BlowfishJ implementation of Blowfish for encryption.
A Java Swing application to 'securely' store passwords using symmetric encryption. A user can set up one or many 'datastores' of password/username combinations and commit them to disk. They are stored on the file system using PBE Blowfish.
Java Chaotic Random Number Generator - Inspired by chaos theory, the intent of this generator is to produce unseeded, unpredictable numbers. The numbers will not follow a predictable sequence and will not rely on a pseudorandom algorithm.
Open eSign allows software developers and technical parties in a company to create secure, online (web-based) forms and documents that follow a business process flow and enable legally recognized electronic signatures using digital signature technology.